|
The research aims to reveal the relationship between the use of social networking sites and the image that females make about their physical formation, the nature of the effects, their value judgments about the image of their bodies, their attitudes toward plastic surgery, the most important types of these processes for them, their motivations to conduct them, and the cultural pressures they are exposed to. The study, moreover, investigates in the effects of those plastic surgery on their behavior as active and interacting users with what is published on social media, according to the theory of social comparison. This paper is an attempt to understand the pattern of social networking operation and its implications for the human self. The research community formed of "females", and the sample included (204) respondents from the followers of "fashionista/ fashionist". The survey approach was used over the intentional sample method to obtain research data through the electronic questionnaire. The questionnaire contained closed questions and phrases according to Likert scale. The research reached several results, including: The sample of the research mostly ranges between 18-28 years of age, having a university education, and are not married and economically sufficient. Always interested in following "fashion" from "fashionista", and sometimes learning cooking techniques, and rarely follow "fashionist". They have a desire to perform plastic surgery, and they were respectively "filler and Botox, remove wrinkles", rhinoplasty, plastic surgery and whitening teeth, sculpting the waist and buttocks, getting the lip of the duck, and finally liposuction and stomach cutting. As for their motives of plastic surgery, mostly, are done in order to satisfy themselves, and in the second place to satisfy people, and in the third position to satisfy their husbands, and in the fourth position to obtain a husband. Finally, they do that to get a job.
|
The present research was performed to study the qualitative and quantitative composition of epiphytic algae on the aquatic host plant Ceratophyllum demersum L. Four sites in Tigris River, at Wassit Governorate were covered, during the seasons of Autumn 2017, winter 2018, Spring 2018, and Summer 2018. The study also included measuring the physiochemical parameters (temperature of air and water, pH , water level, EC, salinity, TDS, TSS, dissolved oxygen, BOD5, alkalinity, total hardness, calcium, magnesium, total nitrogen, total phosphourus). The total number of species of epiphytic algae was145 species, 98 species belonging to Bacillariophyceae, followed by 27species of class Cyanophyceae, 19 species of class Chloroph
... Show MoreIntroduction: Dental pulp tissue contains many undifferentiated mesenchymal cells, which have the ability to differentiate into different specialized cells. Induced pluripotent stem cells have been developed by various growth factors. The present study was designed to evaluate the effect of application of a combination BMP2/TGF β1 as capped material for traumatic pulp in osteoporotic rat. Materials and Methods: Twelfth female rats (6 normal rat and other 6 osteoporotic rat)., their maxillary anterior teeth subjected to mechanical traumatized pulptomy, the left tooth has speared without treatment, while the right tooth capped with application of 0.5 μl of BMP2 and 0.5μl of TGF β1 .Evaluation of histological changes includes scoring of pu
... Show MoreAfter a temporary halt to forced thghebr in different cities of Iraq this methodlogy
opeations returned directiy in the areas of political conflict on the ground which are translated
operations and forced displacement violence es they operations aimed at completing the
forced displacement that occurred after the occupation in(2003)which took an upward curve
publicly after these events and some of which are aimed at the liquidation of some provinces
than any demographic diversity of religious or sectarian or alhens and others aimed at
redemographic distribution within the province itself to produce a net sectarian zones as is the
case in Diyala Nineveh and Babylon Baghdad has the epicenter of sectarian violence and th
Praise be to God, who started his book with the praise of himself and prayers and peace be upon those who have no prophet after him and his family and companions and those who followed them with charity until the Day of Judgment.
For it is known to every researcher in jurisprudence and its origins that the semantics in terms of formulas for assignment are divided into an order and a prohibition, and I have seen it necessary to write a small research on the prohibition, and since this topic is complex, and has a great impact on the difference of scholars, I decided to write on one issue of it And it is the absolute prohibition and its effect on the difference of jurists, and what is meant by the absolute p
Automatic Programming Assessment (APA) has been gaining lots of attention among researchers mainly to support automated grading and marking of students’ programming assignments or exercises systematically. APA is commonly identified as a method that can enhance accuracy, efficiency and consistency as well as providing instant feedback on students’ programming solutions. In achieving APA, test data generation process is very important so as to perform a dynamic testing on students’ assignment. In software testing field, many researches that focus on test data generation have demonstrated the successful of adoption of Meta-Heuristic Search Techniques (MHST) so as to enhance the procedure of deriving adequate test data for efficient t
... Show MoreKey generation for data cryptography is vital in wireless communications security. This key must be generated in a random way so that can not be regenerated by a third party other than the intended receiver. The random nature of the wireless channel is utilized to generate the encryption key. However, the randomness of wireless channels deteriorated over time due to channel aging which casing security threats, particularly for spatially correlated channels. In this paper, the effect of channel aging on the ciphering key generations is addressed. A proposed method to randomize the encryption key each coherence time is developed which decreases the correlation between keys generated at consecutive coherence times. When compared to the
... Show More